Ethical Hacking: Essential Guide to Hacking & Cyber Security - 9 Course Bundle

Ethical Hacking: Essential Guide to Hacking & Cyber Security - 9 Course Bundle

Gain a full understanding of Hacking & Cyber Security through 9 in-depth courses. This course bundle is perfect for anyone who wants to gain an entry into the world of Ethical Hacking and will teach you everything you need to know about this highly paid & sought after skill.

£249.99

£249.99

Why Choose Us?

Description

Ethical Hacking: Cryptography for Hackers

You will learn about message authentication, virtual private networking, Windows encryption, advanced cryptology, and so much more! Length: 1.5 hrs

Ethical Hacking: Cyber Anonymity

You will start by understanding network anonymity by using tools such as Tor, Tortilla and Proxy Chains. By the time you’ve completed this course, you will know all about IP Spoofing, MAC Spoofing, email security, and more. Length: 2.5 hrs

Ethical Hacking: Hacking Applications

Start by understanding network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. By the time you’ve completed this course, you will know all about XSS attacks, buffer overflows, hacking AJAX and more. Length: 1.5 hrs

Ethical Hacking: Hacking Databases

Start by understanding the importance of database security, and then move on to utilizing MySQL for Lab Buildout, Lockdown, and Security Architecture. By the time you’ve completed this course, you will know all about Shodan, operating system hardening, and even big data security. Length: 2 hrs

Ethical Hacking: Honeypots, IDS and Firewalls

You will start by learning about Intrusion Detection Systems (IDS), and then move on to topics such as Snort, Honeydrive installation, and advanced perimeter security. By the time you’ve completed this course, you will know all about firewalls, LAN security, threat management, and even DNSSec. Length: 1.5 hrs

Ethical Hacking: Malware Development

The course starts with an introduction to malware, and then covers topics such as Internet Worm Maker, JPS Virus Maker, and Ghost Eye. By the time you’ve completed this course, you will know how to create a custom trojan, perform a static malware analysis, and so much more! Length: 1 hrs

Ethical Hacking: Recon and Footprinting

Start by learning about website and e-mail footprinting, and then move on to topics such as port inspection with Netstat, Nmap and Metasploit, and Maltego. By the time you’ve completed this course, you will know how to perform a SNMP probe and SMTP inspection, and so much more! Length: 1 hrs

Ethical Hacking: Social Engineering

Start with an introduction to social engineering, and then move on to topics such as PayPal phishing and the Browser Exploitation Framework. By the time you’ve completed this course, you will know all about cyber attacks, security for both HR and personnel, and so much more. Length: 1 hr

Ethical Hacking: Wireless Hacking

Start with an introduction to wireless hacking, and then move on to topics such as Aircrack, Reaver, Bluetooth, and Ubertooth. By the time you’ve completed this course, you will know all about advanced wireless security, Kismac, Metasploit, and much more. Length: 1.5 hrs

 

Courses Included

ETHICAL HACKING: CRYPTOGRAPHY FOR HACKERS
ETHICAL HACKING: CYBER ANONYMITY
ETHICAL HACKING: HACKING APPLICATIONS
ETHICAL HACKING: HACKING DATABASES
ETHICAL HACKING: HONEYPOTS, IDS AND FIREWALLS
ETHICAL HACKING: MALWARE DEVELOPMENT
ETHICAL HACKING: RECON AND FOOTPRINTING
ETHICAL HACKING: SOCIAL ENGINEERING
ETHICAL HACKING: WIRELESS HACKING

Shopping Basket